Nane: Identifying Misuse Cases Using Temporal Norm Enactments
MAR 27, 2017 11:10 AM
A+ A A-
Nane: Identifying Misuse Cases Using Temporal Norm Enactments

Nane: Identifying Misuse Cases Using Temporal Norm Enactments

Ozgur Kafali
Munindar P. Singh
Laurie Williams

Data breaches often originate from legitimate users, not only from technical vulnerabilities. A new formal framework identifies misuse cases in a healthcare scenario.

Read full article

FIRST
PREV
NEXT
LAST
Page(s):
[%= name %]
[%= createDate %]
[%= comment %]
Share this:
Please login to enter a comment:
 

Computing Now Blogs
Business Intelligence
by Keith Peterson
Cloud Computing
A Cloud Blog: by Irena Bojanova
The Clear Cloud: by STC Cloud Computing
Careers
Computing Careers: by Lori Cameron
Display Technologies
Enterprise Solutions
Enterprise Thinking: by Josh Greenbaum
Healthcare Technologies
The Doctor Is In: Dr. Keith W. Vrbicky
Heterogeneous Systems
Hot Topics
NealNotes: by Neal Leavitt
Industry Trends
Internet Of Things
Sensing IoT: by Irena Bojanova

 

RESET